Part I_Keynote Address:1. The game of Wall Cops and Robbers.-
2. Smartphone Applications, Malware
and Data Theft.- 3. Towards Evolutionary Multitasking: A New Paradigm in Evolutionary Computation.- 4. Generating a Standardized Upper Ontology for Security of Information and
Networks.- Part II_Computational Intelligence: Chapter 1. Analysis of Throat Microphone Using MFCC
features for Speaker Recognition.- Chapter 2. Single-pixel Based Double
Random-Phase Encoding Technique.- Chapter 3. Kernel Online Multi-task
Learning.- Chapter 4. Performance Evaluation of Sentiment
Classification Using Query Strategies in a Pool Based Active Learning Scenario.-
Chapter 5. An Enhanced Image Watermarking Scheme Using Blocks
with Homogeneous Feature Distribution.- Chapter
6. Performance Analysis of ApEn as
a Feature Extraction Technique and Time Delay Neural Networks, Multi-layer
Perceptron as Post Classifiers for the Classification of Epilepsy Risk Levels
from EEG Signals.- Chapter 7.
Suspicious Human Activity Detection in
Classroom Examination.- Chapter 8.H 8
State
Estimation of Discrete Time Delayed Neural Networks with Multiple Missing Measurements
Using Second Order Reciprocal Convex Approach.- Chapter 9. A Fuzzy
Methodology for Clustering Text Documents with Uncertain Spatial References.- Chapter
10. A Novel Feature Extraction Algorithm from
Fingerprint Image in Wavelet Domain.- Chapter 11. Motor
imagery Classification Based on Variable Precision Multigranulation Rough Set.-
Chapter 12. Fault Tolerant and Energy Efficient Signal Processing on FPGA Using Evolutionary
Techniques.- Chapter 13. A Two Phase Approach for Efficient Clustering
of Web Services.- Chapter 14. Elimination of Redundant Association Rules
– An Efficient Linear Approach.- Chapter 15. Clustering Techniques from
Significance Analysis of Microarrays.- Chapter 16. Breast Region
Extraction and Pectoral Removal by Pixel Constancy Constraint approach in
Mammograms.- Chapter 17. Bridging the Semantic Gap in Image Search via
Visual Semantic Descriptors by Integrating Text and Visual Features.- Chapter
18. Adaptive Equalization Algorithm for Electrocardiogram Signal
Transmission.- Chapter 19. An Efficient Approach for MapReduce
Result Verification.- Chapter 20. Improving Lifetime of Memory Devices Using Evolutionary
Computing Based Error Correction Coding.- Chapter 21. Comparison of
Machine Learning Techniques for the Identification of the Stages of Parkinson's
Disease.- Chapter 22. Security Constrained Unit Commitment Problem Employing
Artificial Computational Intelligence for Wind-thermal Power System.- Chapter
23. Human Gait Recognition Using Fuzzy Logic.- Chapter 24. Detection
and Diagnosis of Dilated and Hypertrophic Cardiomyopathy by Echocardiogram
Sequences Analysis.- Chapter 25. An Elitist Genetic Algorithm Based
Extreme Learning Machine.- Chapter 26.
Formulation and Enhancement of User Adaptive
Access to the Learning Resources in E-Learning Using Fuzzy Inference Engine.- Part III_Cyber Security:Chapter 27. A Robust User Anonymity Preserving Biometric Based Multi-server
Authenticated Key Agreement Scheme.- Chapter
28. Extended Game Theoretic Dirichlet Based Collaborative Intrusion
Detection Systems.- Chapter 29.
Implementation of ECDSA Using Sponge Based Hash Function.- Chapter 30. Contrast-Enhanced Visual Cryptography Schemes Based on
Perfect Reconstruction of White Pixels and Additional Basis Matrix.-
Chapter 31. Hash Based Two Gateway Payment Protocol Ensuring
Accountability with Dynamic ID-verifier for Digital Goods Providers.- Chapter 32. Decrypting
Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation.- Chapter 33. A Lock and Key Share (2,m,n) Random Grid Visual Secret Sharing Scheme
with XOR and OR Decryptions.- Chapter 34. Multilevel Multimedia Security by Integrating Visual Cryptography and
Steganography Techniques.- Chapter 35. K
out of N Secret Sharing Scheme with Steganography and Authentication.- Chapter 36. A Centralized Trust Computation Model (CTC) for Secure Group Formation in
Military Based Mobile Ad-hoc Networks Using Stereotypes.- Chapter
37. Cost Effective Re-keying Approach for Dynamic Membership Changes in Group Key
Management.- Chapter 38. A Multipath Routing Protocol which Preserves Security and Anonymity of
Data in Mobile Ad-hoc Networks.- Chapter 39. An Efficient Continuous Auditing Methodology for Outsourced Data Storage
in Cloud Computing.- Part IV_Computational Models:Chapter 40. A Study on Building
Seamless Communication Among Vehicles in Vanet Using the Integrated Agent
Communication Model (IACM).- Chapter 41.
A Hybrid Approach for Data Hiding
through Chaos Theory and Reversible Integer Mapping.-
Chapter 42. Fluid Queue Driven by an M/E2/1 Queuing Model.- Chapter 43. An Effective Tool
for optimizing the Number of Test Paths in Data Flow Testing for Anomaly
Detection.- Chapter 44. Venus Flytrap
Optimization.- Chapter 45.
Zumkeller Cordial
Labeling of Graphs.- Chapter
46. Cuckoo Based
Resource Allocation for Mobile Cloud Environments.- Chapter 47. Transient Analysis
of an M/M/c Queue Subject to Multiple Exponential Vacation.- Chapter 48. Fractional Filter Based
Internal Model Controller for Nonlinear Process.- Chapter 49. A Novel Method for
Solving Triangular and Trapezoidal Intuitionistic Fuzzy Games Using Dominance
Property and Oddment Method.